
- 500 pages
- English
- PDF
- Available on iOS & Android
About this book
Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Contents
- Foreword
- Preface
- Chapter 1 Information and Conflict
- CHAPTER 2 Cyberattack Life Cycles
- CHAPTER 3 Cyber Risk
- CHAPTER 4 Legal Aspects of Cyber Warfare and IW
- CHAPTER 5 Digital and Wireless Communication
- CHAPTER 6 Introduction to Networking
- CHAPTER 7 Networking Technology: Ethernet, Wi-Fi, and Bluetooth
- CHAPTER 8 Introduction to Internet Protocol and IP Addresses
- CHAPTER 9 The Transport Layer, the Application Layer, the Internet, and the Web
- CHAPTER 10 Offensive Cyber Operations by Nation- State Actors
- CHAPTER 11 Offensive Cyber Operations: Techniques, Procedures, and Tools
- CHAPTER 12 Cybersecurity and the Maritime Domain
- CHAPTER 13 The Cybersecurity of U.S. Election Systems
- About the Author
- Index